Splunk Search

Comparing two fields from events with fields from a list Lookup

nalia_v
Loves-to-Learn Everything

Hello.

Again, these lookups ). The hardest thing about queries.

The request itself is the identification of users who logged in not from their workstation.

index=windows user!=*$ 
|search (EventCode=4776 OR EventCode=4624)
|transaction user startswith=(EventCode="4624") endswith=(EventCode="4776")
|lookup workst_user hostname as Source_Workstation OUTPUT user as login
|table _time,EventCode,user,Source_Network_Address,Source_Workstation,dest_nt_host,name,status,dest,Logon_Type,Logon_Process

Fields from Source_Workstation and user events are compared. Fields from the hostname and login list workst_user.

The comparison itself - machines are compared among themselves, and users are among themselves. If any of the comparisons is incorrect, the output of non-matching fields in the event is incorrect. How to build the right look from these conditions ?

Labels (1)
0 Karma
Get Updates on the Splunk Community!

Why You Can't Miss .conf25: Unleashing the Power of Agentic AI with Splunk & Cisco

The Defining Technology Movement of Our Lifetime The advent of agentic AI is arguably the defining technology ...

Deep Dive into Federated Analytics: Unlocking the Full Power of Your Security Data

In today’s complex digital landscape, security teams face increasing pressure to protect sprawling data across ...

Your summer travels continue with new course releases

Summer in the Northern hemisphere is in full swing, and is often a time to travel and explore. If your summer ...